index - Equipe Cybersécurité et Cryptographie

Dernières publications

Mots clés

Resistance Virtualization and Cloud Computing Classification algorithms Decision Problems Algorithm Access Control Boolean Satisfiability Problems Security Blockchain Protocols Bridge OPC UA Servers Internet of Things Physical unclonable function Digital signatures Industrial Environment Authentication Complexity Computer architecture Software Complexity theory Dataset Microcontrollers Cybersecurity Complexity Theory Certificate Strong solutions Countermeasure Classification Equivalence relations Cloud Computing Access control Internet of Things IoT Arabic Natural Language Processing Program processors Identifying Codes Cryptanalysis and other attacks Symmetric cryptography Network security Certificate-less PKI Hardware Secure Elements Attack graph Data security Entropy Simulation HIP Delays Symmetric difference distance Domination C-ITS Privacy Combinatorial optimization Ethereum Machine learning Misbehavior Detection Named Data Networking CAM Cybersécurité ETSI WSN Certificate request Industry Dominating codes IoT Graph Theory PKI Cryptography Identifying codes Demi-treillis à médianes Complexité Machine Learning Communication V2X Clustering Adaptation models Costs Vehicular networks Internet Computer crime Uniqueness of Solution Cryptographic accumulators Block and stream ciphers Blockchains Data centers Apprentissage automatique OpenID NP-completeness Twin-Free Graphs Connected vehicles Security and privacy Bent User-Centric Identity Polynomial Reduction Sécurité Graph theory Actuators Anomaly detection Risk assessment Wireless communication

 

 

Publications avec texte intégral

136

Références bibliographiques

508

Open access

29 %

 

Collaborations par pays